EP1048142B1 - Key management system - Google Patents
Key management system Download PDFInfo
- Publication number
- EP1048142B1 EP1048142B1 EP99903648A EP99903648A EP1048142B1 EP 1048142 B1 EP1048142 B1 EP 1048142B1 EP 99903648 A EP99903648 A EP 99903648A EP 99903648 A EP99903648 A EP 99903648A EP 1048142 B1 EP1048142 B1 EP 1048142B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- server
- user
- key
- message
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 230000001010 compromised effect Effects 0.000 claims abstract description 12
- 230000000694 effects Effects 0.000 abstract description 2
- 101100465058 Caenorhabditis elegans prk-2 gene Proteins 0.000 description 11
- 238000000034 method Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 4
- 241000759872 Griselinia lucida Species 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 2
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Definitions
- the invention relates to a management system for cryptographic keys.
- cryptographic techniques For the purpose of protecting electronic communication, there are two cryptographic techniques: secret-key (SK) systems working with pairs of identical, secret keys (codes) and public/private-key (PrPuK) systems working with pairs of associated, non-identical keys.
- PrPuK systems are used especially when the communication partners do not know one another beforehand, such as with large groups of users.
- each user has a private (“secret”) key (PrK) and an associated public key (PuK).
- PuKs of the various users are freely available from, e.g., a "Trusted Third Party" (TTP), incorporated in a TTP server (SV).
- TTP Trusted Third Party
- SV TTP server
- the PrK is known only to the user.
- a user A and a user B are registered with a server SV1.
- User A has a private key - PrKa - while his public key - PuKa - is stored in the server SV1.
- User B also has a private key - PrKb - while his public key is also stored in the server SV1.
- the private keys may be guarded in the server, with a view to backup for the user, continuity considerations in a company environment, or on account of legal obligations.
- the server makes available certificates of the public user keys - PuKa, PuKb etc. A copy of a PrK is made available only to the user whose property said PrK is, e.g., in the event that the user has lost his PrK.
- a request by a user A to be provided with the PuK of a specific user B is honoured by the TTP server by transmission of a certificate of the required PuK - PuKb.
- Said certificate comprises the PuK of the user, provided with a digital signature, making use of the PrK of the server; hereinafter, such key certificates are represented by: ⁇ PuKa ⁇ PrKsv1, ⁇ PuKb ⁇ PrKsv1 etc., where PrKsv1 represents the private key of server SV1.
- the digital signature which, for the sake of authentication of the sender, is added to a message, is formed by enciphering, using the PrK of the sender , the "plain text" of the message proper or, which is generally preferred in view of the processing speed, by enciphering a (binary) summary of said message, called “hash” or “digest” (for the production thereof, there are standard algorithms known from literature).
- the receiver of a message deciphers the enciphered "plain text” or "hash” serving as signature. If the result is OK, the message obviously originates from the owner of said public key ⁇ the supposed sender.
- a message must be transmitted in enciphered form, it is enciphered using the public key of the receiver , who is then capable of deciphering the message using his own private key.
- An electronic signature added to a message (whether enciphered or not) consists of a copy or binary summary of said message ("hash"), enciphered using the private key of the sender ; the receiver then deciphers the electronic signature using the public key of the sender.
- users may dispose of PuKs certified using the digital signature of the TTP server, as a result of which the integrity of the transmitted PuK is guaranteed.
- the public key of the server - PuKsv1 - which is made available to each user registered with the SV1
- Said enciphered message may then be deciphered (only) by user B using his PrK - PrKb.
- the international application WO 99/37053 discloses a method for replacing the public key part of a public key / private key pair of a central trusted authority in cases that the private key part of the pair is compromised.
- the method comprises firstly the distribution (in-band channel) of an emergency message indicating that its private key part is compromised, which message contains a replacement public key part of a new public key / private key pair and a signature using the private key part of the compromised key pair, and secondly the simultaneous publishing in an out-of-band channel a value V which is derived from the emergency message.
- the second part of the method is to certify that the emergency message originates at the central trusted authority.
- Such a method has the disadvantages firstly that it needs an additional distribution channel (i.c. the out-of-band channel), and secondly that the method combines unnecessary in a simultaneous action the distribution of the emergency message, the key replacement and the certification of origin.
- the present invention provides for a system for overcoming the problem stated hereinabove, namely, reliably transmitting to users a message that the PrK of the CA (TTP server) has become compromised without using an additional distribution channel.
- a key management system according to the preamble of claim 1, of a kind known from the international application WO 99/37053, has according to the invention the characteristics of claim 1.
- the invention assumes that not only the PuKs of the users are stored in the TTP server, but the PrKs as well.
- use is made of said user PrKs stored in the TTP server by transmitting, after the PuK of the TTP has become compromised, to each user whose own key PrK is not known as having been compromised, an (electronic) message which, instead of with the PrK of the TTP, has been authenticated with the private key (PrK) of said user.
- said authentication is done by enciphering the message itself, or a code ("hash”, "digest") derived from the message in a standard way. Please take note of tha fact that normally a message to a user is not enciphered with the PrK but with the PuK of the user.
- the new PuK of the TTP may be transmitted to the user in an identical manner.
- Each user may decipher the information thus received from the TTP server using his own PuK, and therefore knows for sure that, since only the TTP possesses a copy of the user's PrK, the message originates from the TTP; this also applies to the TTP PuK transmitted in the same manner.
- the software of the users preferably comprises a module which detects whether a message received, in this case from the TTP server, was enciphered or authenticated with the PrK of the user. If the module so detects, the users' software must modify its settings with respect to the PuK of the TTP.
- FIG. 1 shows a network 1, a network server 2 which also serves as TTP server, and a number of terminals 3 on which users 4 and 5 have chosen domicile.
- Messages are exchanged in enciphered form.
- User 4 who wants to transmit a message (MSG4) to user 5, enciphers said message with the public key of user 5 ⁇ PuK5.
- the PuK of user 5 ⁇ PuK5 ⁇ may be obtained by user 4 by retrieving, with the server 2, a certificate of PuK5; ⁇ PuK5 ⁇ PrK2, where PrK2 is the private key of the server 2. If deciphering ⁇ PuK5 ⁇ PrK2 with the public key of the server ⁇ PuK2 ⁇ is successful, user 4 knows that the key PuK5 indeed originates from server 2.
- the users' software in the terminals 3 preferably comprises a module for retrieving from the server 2, upon transmission of a message, the certificate of the current PuK of the addresse, for calculating the PuK of the addresse therefrom, for enciphering the message with said calculated PuK, and for transmitting the enciphered message.
- PrK of server 2 - PrK2 - is no longer reliable or usable, the latter can no longer be used for sender authentication ("electronic signature") upon transmission of public keys from the server to the users.
- Secure transmission may be guaranteed only after a new PrK2 has been generated with the server 2 and after the associated PuK2 has been distributed among the users. Said distribution should also be done securely. In doing so, however, the old combination of PrK2 and PuK2 can no longer be used since, after all, the PrK2 has become unreliable or unusable.
- the combination of the new value of PrK2 - PrK2' - and associated new value for PuK2 - PuK2' - may not be used either, since the users do not yet have PuK2'.
- the server 2 transmits a message to each user, enciphered or at any rate authenticated using the PrK of the receiver: for user 4, the message is certified (authenticated) using PrK4, for user 5 using PrK5.
- User 4 may decipher said message using his public key - PuK4 - user 5 using PuK5.
- Other users might be able to decipher said message, namely, with the public key of user 4, but in this case it does not matter, since the message is at any rate distributed among all users, and the contents are not secret anyway.
- the message is certified as originating from the server 2; after all, apart from user 4 only server 2 may dispose of PrK4; in this case, PrK4 is therefore used for authentication instead of the compromised PrKs.
- a message is transmitted to user 5, authenticated using PrK5, and in the same manner to each user registered as a network user with server 2.
- the new PuK of server 2 - PuK2 ⁇ which is generated simultaneously with the new value for PrK2 ⁇ is also transmitted to all users.
- said new value of PuK2 is certified (authenticated) using the PrK of the user.
- the server 2 may generate, e.g., a unique (secret) terminal code for each separate terminal 3 which, enciphered with a public terminal key (PuK3), is transmitted to the terminal and stored there, after having been deciphered (by the terminal) with the private key (PrK3) of said terminal.
- a unique (secret) terminal code for each separate terminal 3 which, enciphered with a public terminal key (PuK3), is transmitted to the terminal and stored there, after having been deciphered (by the terminal) with the private key (PrK3) of said terminal.
- the message to that effect and the value of the new public server key may be enciphered with the secret terminal code stored in the server.
- the message and the new value for PuK2 may be deciphered with the same secret terminal code which, after all, is also stored in the terminal.
- the secret terminal code stored in both the server and the terminal therefore, functions as secret key within an (ad hoc) SK system between the server and the terminal.
- PrK and PuK respectively, of the user (which the user enters into the terminal by way of a personal token or smart card or in another way, as a result of which they reside in the terminal for a shorter or longer period of time)
- a PrK or PuK respectively, of the terminal itself (which basically resides in the terminal permanently) in a similar manner.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
- Selective Calling Equipment (AREA)
Abstract
Description
Claims (3)
- Management system for cryptographic keys for a communication network (1) connecting a server (2) and a number of user terminals (3) on which users (4,5) may choose domicile for network communication, the server comprising means for storing and issuing cryptographic keys, namely, for each user or terminal a private key (PrK) and an associated public key (PuK), the management system itself also having its own private key and associated public key, which are normally used for certifying for authenticity the messages and/or cryptographic keys to be transmitted from the server to the users, characterised in that the server (2) comprises means for, under circumstances in which the private key of the management system itself is compromised or otherwise unusable, transmitting to each user (4, 5) a message, the user having means for certifying said message for authenticity using the private key and the public key of the user or terminal, the private key of the user being stored in the server and the public key of the user being stored in the terminal or with the user.
- The management system of claim 1, characterised in that said message is transmitted to the users (3) if the private key and the public key of the server (2) have been replaced by a new private and public key, and that the message comprises a copy of the new public key of the server.
- The management system of claim 2, characterised in that the terminals comprise means for storing the private key of the user (4, 5) or terminal (3) and a copy of the public key of the server (2), as well as means for detecting messages which are certified using a key, equal to said private key, as well as means for detecting, in a message so certified, a copy of the new public key of the server, and for replacing the stored copy of the old public key with the copy of the new key of the server detected in the message.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| NL1008044A NL1008044C2 (en) | 1998-01-16 | 1998-01-16 | Key management system. |
| NL1008044 | 1998-01-16 | ||
| PCT/EP1999/000299 WO1999037053A1 (en) | 1998-01-16 | 1999-01-14 | Key management system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| EP1048142A1 EP1048142A1 (en) | 2000-11-02 |
| EP1048142B1 true EP1048142B1 (en) | 2004-04-14 |
Family
ID=19766359
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP99903648A Expired - Lifetime EP1048142B1 (en) | 1998-01-16 | 1999-01-14 | Key management system |
Country Status (6)
| Country | Link |
|---|---|
| EP (1) | EP1048142B1 (en) |
| AT (1) | ATE264579T1 (en) |
| AU (1) | AU2422499A (en) |
| DE (1) | DE69916420T2 (en) |
| NL (1) | NL1008044C2 (en) |
| WO (1) | WO1999037053A1 (en) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| NL1013450C2 (en) * | 1999-11-02 | 2001-05-03 | Konink Kpn N V Groep Intellect | Random bit sequence distribution system, comprises trusted third party distribution server and true random number generator |
| DE102004044892A1 (en) | 2004-09-14 | 2006-03-30 | Thoughtfab Limited, Birmingham | Process for the documentation of a property or possession as well as the transfer of the same to a commodity |
| US8199900B2 (en) * | 2005-11-14 | 2012-06-12 | Aspect Software, Inc. | Automated performance monitoring for contact management system |
| US8285985B2 (en) | 2008-12-15 | 2012-10-09 | Sap Ag | Systems and methods for detecting exposure of private keys |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5241599A (en) * | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
| US5680458A (en) * | 1995-11-14 | 1997-10-21 | Microsoft Corporation | Root key compromise recovery |
| US5761306A (en) * | 1996-02-22 | 1998-06-02 | Visa International Service Association | Key replacement in a public key cryptosystem |
-
1998
- 1998-01-16 NL NL1008044A patent/NL1008044C2/en not_active IP Right Cessation
-
1999
- 1999-01-14 EP EP99903648A patent/EP1048142B1/en not_active Expired - Lifetime
- 1999-01-14 AT AT99903648T patent/ATE264579T1/en not_active IP Right Cessation
- 1999-01-14 WO PCT/EP1999/000299 patent/WO1999037053A1/en not_active Ceased
- 1999-01-14 DE DE69916420T patent/DE69916420T2/en not_active Expired - Lifetime
- 1999-01-14 AU AU24224/99A patent/AU2422499A/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| WO1999037053A1 (en) | 1999-07-22 |
| AU2422499A (en) | 1999-08-02 |
| DE69916420D1 (en) | 2004-05-19 |
| ATE264579T1 (en) | 2004-04-15 |
| NL1008044C2 (en) | 1999-07-19 |
| DE69916420T2 (en) | 2005-05-19 |
| EP1048142A1 (en) | 2000-11-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8200760B2 (en) | Storage and authentication of data transactions | |
| FI107205B (en) | Procedure for securing data | |
| US8560655B2 (en) | Methods and apparatus for controlling the transmission and receipt of email messages | |
| CN109743171B (en) | Key series method for solving multi-party digital signature, timestamp and encryption | |
| EP2361462B1 (en) | Method for generating an encryption/decryption key | |
| US20110145576A1 (en) | Secure method of data transmission and encryption and decryption system allowing such transmission | |
| CN114567431A (en) | Security authentication method for unidirectional transmission | |
| US7660987B2 (en) | Method of establishing a secure e-mail transmission link | |
| JPH10105057A (en) | Time stamp server system | |
| CN102077542B (en) | Secure digital communications | |
| EP1048142B1 (en) | Key management system | |
| CN102571338A (en) | PKI (Public Key Infrastructure)-based method and system for certifying internet of things | |
| CN107682156A (en) | A kind of encryption communication method and device based on SM9 algorithms | |
| EP1116368B8 (en) | A secure data transfer system | |
| CN100454807C (en) | A Method of Protecting Information Integrity | |
| CN109302400A (en) | A kind of cryptographic asset deriving method for O&M auditing system | |
| KR100432611B1 (en) | System for providing service to transmit and receive document based on e-mail system and method thereof | |
| CN115174277A (en) | Data communication and file exchange method based on block chain | |
| CN114528577A (en) | Anonymous data sharing method and system based on block chain | |
| EP1357697B1 (en) | Secure communication via the internet | |
| NL1008045C1 (en) | Control system for cryptographic keys in computer network | |
| KR100654933B1 (en) | Authentication system and authentication method for authenticating certificate dynamically generated according to user's password input | |
| US12335241B2 (en) | Cryptographic communication binding system and method | |
| JP2004500593A (en) | Security module and method for creating anti-counterfeit documents | |
| JP6343425B2 (en) | Authentication infrastructure system with user authority confirmation function |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20000816 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LI LU NL PT SE |
|
| GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
| GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
| GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
| AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LI LU NL PT SE |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20040414 |
|
| REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: NV Representative=s name: ISLER & PEDRAZZINI AG |
|
| REF | Corresponds to: |
Ref document number: 69916420 Country of ref document: DE Date of ref document: 20040519 Kind code of ref document: P |
|
| REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
| REG | Reference to a national code |
Ref country code: SE Ref legal event code: TRGR |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20040714 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20040714 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20040725 |
|
| ET | Fr: translation filed | ||
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: LU Payment date: 20050124 Year of fee payment: 7 |
|
| PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
| 26N | No opposition filed |
Effective date: 20050117 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20060131 |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: PCAR Free format text: ISLER & PEDRAZZINI AG;POSTFACH 1772;8027 ZUERICH (CH) |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040914 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: AT Payment date: 20090115 Year of fee payment: 11 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: SE Payment date: 20091223 Year of fee payment: 12 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IE Payment date: 20100121 Year of fee payment: 12 Ref country code: CH Payment date: 20100125 Year of fee payment: 12 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IT Payment date: 20100126 Year of fee payment: 12 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NL Payment date: 20100118 Year of fee payment: 12 Ref country code: BE Payment date: 20100315 Year of fee payment: 12 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20100114 |
|
| BERE | Be: lapsed |
Owner name: KONINKLIJKE *KPN N.V. Effective date: 20110131 |
|
| REG | Reference to a national code |
Ref country code: NL Ref legal event code: V1 Effective date: 20110801 |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
| REG | Reference to a national code |
Ref country code: SE Ref legal event code: EUG |
|
| REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20110131 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20110131 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20110131 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20110114 Ref country code: NL Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20110801 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20110114 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20110115 |
|
| REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 18 |
|
| REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 19 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20170120 Year of fee payment: 19 Ref country code: FR Payment date: 20170120 Year of fee payment: 19 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20170119 Year of fee payment: 19 |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 69916420 Country of ref document: DE Representative=s name: PATENTANWALTSKANZLEI THILO SCHOEN, DE Ref country code: DE Ref legal event code: R082 Ref document number: 69916420 Country of ref document: DE Representative=s name: DR. SCHOEN, NEYMEYR & PARTNER MBB, DE |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 69916420 Country of ref document: DE Representative=s name: PATENTANWALTSKANZLEI THILO SCHOEN, DE |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 69916420 Country of ref document: DE |
|
| GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20180114 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180801 Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180131 |
|
| REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20180928 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180114 |